• Recent Post

  • RSS R o o t s e c u r e

    • Verizon: Espionage hacking grows, with more from east Europe
      Hacking for espionage purposes is sharply increasing, with groups or national governments from Eastern Europe playing a growing role, according to one of the most comprehensive annual studies of computer intrusions. Spying intrusions traced back to any country in 2013 were blamed on residents of China and other East Asian nations 49 percent of the time, but […]
    • Google to refund buyers of 'fake' anti-virus app
      Google has decided that a smallish (for The Chocolate Factory) wad of cash is a trivial price to pay for maintaining its reputation, and has begun refunding punters who fell for the fake “virus shield” scam. Uncovered by Android Police earlier this month, the fake virus scanner was nothing more than an icon that changed shape when a user tapped it. The app h […]
    • Active malware campaign steals Apple passwords from jailbroken iPhones
      Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads.Tags: AppleiPhoneSecurity […]
    • Digging for answers: The "strong smell" of fraud from one Bitcoin miner maker
      For many crypto-minded libertarians, Bitcoin is the future of money. But that dream hasn't been helped much by the numerous high-profile legal cases involving the currency in recent years: The Bitcoin Savings and Trust hedge fund collapsed; uncertainty fueled the implosion of Mt. Gox, the currency's largest exchange; and the high-profile Silk Road […]
    • Former GitHub CEO leaves the company
      Tom Preston-Werner — founder of the immensely popular social coding site GitHub and its most prominent executive — has left the company in the wake of widely publicized sexual harassment investigation. GitHub, a tech-industry darling whose coding software is used by millions of developers worldwide, launched the investigation last month after one of the comp […]
    • 12 ethical dilemmas gnawing at developers today
      The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it' […]
    • Even the most secure cloud storage may not be so secure, study finds
      Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.Tags: cloudSecurity […]
    • Most but not all sites have fixed Heartbleed flaw
      The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week, according to a California security firm. On Thursday, Menifee, Calif.-based Sucuri Security scanned the top 1 million websites as ranked by Alexa Internet, a subsidia […]
    • Six clicks: Top six camera phones compared
      It's difficult to judge the camera capture capability of most high-end phones today because with the right lighting and setup you can capture great photos with nearly all of them. I took the latest and greatest phones out for a spin this weekend and tried to see if any device stood out from the rest. I took photos using the Samsung Galaxy S5, Apple iPho […]
    • Aereo analysis: Cloud computing at a crossroads
      The question of whether online broadcast television is to remain in the hands of a stodgy industry that once declared the VCR the enemy is being put directly before the Supreme Court. Broadcasters' latest legal target is 2-year-old upstart Aereo—which retransmits over-the-air broadcast television using dime-sized antennas to paying consumers, who can wa […]

Cyrus Rico

.::Everything Must Be Share::.

Mempercantik Form dengan OCX

Ini terinsipirasi ketika melihat aplikasi lain yang dibuat dalam bentuk portable,
lalu terlintas dalam pikiran …apa vb bisa dibikin portable gak ya :)

mulai dah coba cari-cari informsi dan utak atik tuh vb..install dan
uninstall dicoba-coba, kemudian melakukan perubahan-perubahan file-file
sistem beserta registrinya……huh susah banget. Dicoba beberapa kali
error terus..pusing euy…tapi setelah sekian jam dicoba-coba akhirnya
bisa juga. Ternyata kalo dah tau gambang juga ya.

Vb yang dibuat menjadi portable ini tidak menyertakan seluruh file sistem
dan komponennya. ya tujuannya hanya bisa menjalankan program vb dan dapat
membuat exe dengan vb.

Yang perlu disiapkan adalah file-file berikut ini:

Image

Setelah siap semua file tinggal membuat registry item, kuncinya semua ada disini:
buat file baru dengan notepad yang berisi

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Licenses\6000720D-F342-11D1-AF65-00A0C90DCA10]
@=”kefeflhlhlgenelerfleheietfmflelljeqf”

[HKEY_CLASSES_ROOT\Licenses\74872840-703A-11d1-A3AF-00A0C90F26FA]
@=”mninuglgknogtgjnthmnggjgsmrmgniglish”

[HKEY_CLASSES_ROOT\Licenses\74872841-703A-11d1-A3AF-00A0C90F26FA]
@=”klglsejeilmereglrfkleeheqkpkelgejgqf”

simpan dengan nama vbpe.reg, setelah selesai anda bisa coba, klick file
vbpe.reg dilanjutkan dengan membuat membuka file vb6.exe untuk mencoba berhasil
tidaknya pembuatan vb portable nya.

Kalo bisa sih cobanya pada komputer yang belum pernah di intsall visual basic,
agar terlihat hasilnya.

Saya rasa cukup sekian dulu, moga bermanfaat..walaupun agak terlambat
informasinya..yang penting manfaat :)

Categories: Pemrograman